Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.
Anti-virus, antimalware
Terms related to spyware, including definitions about malware and words and phrases about online advertising, adware and online privacy.
-
firewall
In computing, a firewall is software or firmware that protects the resources of a private network from users on other networks.
-
spear phishing
Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
-
encryption
In computing, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key.
Application security
Terms related to application security, including procedural definitions for preventing software vulnerabilities and words and phrases about secure code development.
-
WebAuthn API
The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web applications authenticate users without storing their passwords on servers.
-
input validation attack
An input validation attack is any malicious action against a computer system that involves manually entering strange information into a normal user input field.
-
ransomware
Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access is returned to the victim.
Authentication, access control
Terms related to authentication, including security definitions about passwords and words and phrases about proving identity.
-
privilege creep
Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job. In IT, a privilege is an identified right that a particular end user has to a particular system resource, such as a file folder.
-
facial recognition
Facial recognition is a category of biometric software that maps an individual's facial features mathematically and stores the data as a faceprint.
-
private CA (private PKI)
Private CA stands for private certification authority and is an enterprise specific CA that functions like a publicly trusted CA but is exclusively run by or for the enterprise.
Malware
Terms related to malware, including definitions about viruses and Trojans and other words and phrases about malicious software.
-
Pegasus malware
Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, including text messages, emails, key logs, audio and information from installed applications, such as Facebook or Instagram.
-
virus (computer virus)
A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works.
-
phishing
Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
Network security
Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.
-
Computer Security Incident Response Team (CSIRT)
A Computer Security Incident Response Team (CSIRT) is a group of IT professionals that provides an organization with services and support surrounding the prevention, management and coordination of potential cybersecurity-related emergencies.
-
incident response team
An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational emergency.
-
NICE Framework
The National Initiative for Cybersecurity Education Cybersecurity Workforce Framework (NICE Framework) is a reference resource that classifies the typical skill requirements and duties of cybersecurity workers.
Threat management
Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.
-
Security Operations Center (SOC)
A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information security that is responsible for monitoring, analyzing and protecting an organization from cyber attacks.
-
Computer Security Incident Response Team (CSIRT)
A Computer Security Incident Response Team (CSIRT) is a group of IT professionals that provides an organization with services and support surrounding the prevention, management and coordination of potential cybersecurity-related emergencies.
-
virus (computer virus)
A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works.

